Hi, Here's the summary of the IRC meeting.
--- COMMUNITY MEETING Place: #openvpn-meeting on irc.freenode.net Date: Wed 9th December 2020 Time: 11:30 CET (10:30 UTC) Planned meeting topics for this meeting were here: <https://community.openvpn.net/openvpn/wiki/Topics-2020-12-09> Your local meeting time is easy to check from services such as <http://www.timeanddate.com/worldclock> SUMMARY cron2, dazo, mattock, ordex and plaisthos participated in this meeting. --- Noted that plaisthos has implemented AES-CCM. --- Cron2 had tagged 2.4.10 before the meeting. It was released later the same day. --- Discussed the data-channel offload module (DCO) in context of OpenVPN 2.5. The current ovpn-dco only works with p2p but the current p2p model is not easily extendable to p2mp. Therefore plaisthos and ordex agreed that they will switch to a newer model in ovpn-dco that will also support p2mp befor they continue with DCO and 2.5. --- Discussed the OpenSSL bug fixed in OpenSSL 1.1.1i (CVE-2020-1971): <https://www.openssl.org/news/vulnerabilities-1.1.1.html> There seemed to be agreement that this does not really affect OpenVPN. Basically somebody would have to be able to place a messed-up CRL on your OpenVPN server, in which case you have bigger problems than a vulnerable OpenSSL version. OpenVPN also does not download CRLs dynamically, which reduces the impact. Moreover, this problem is only a problem with OpenVPN running as server on Windows. It is also possible, even if not very convenient, to replace the OpenSSL library inside the OpenVPN installation directory (C:\Program Files\OpenVPN) to patch this vulnerability. Due to above the consensus (for the most part) was that we can wait until 2.5.1 that is due in a few weeks before fixing this. If needed, we can backpedal and do a separate OpenVPN 2.5.0 Windows installer release before 2.5.1. OpenVPN 2.4.10 has now been released - it has the fixed OpenSSL version (1.1.1i). --- Full chatlog attached
(12:28:52) ordex: hi (12:31:35) plaisthos: moin (12:32:59) dazo: Hey! (12:33:29) cron2: I am sort of here (12:33:38) cron2: have the window open but focus is elsewhere sorry (12:33:50) dazo: "sort of" is still better than not at all :) (12:36:03) cron2: seems mattock got lost in the 2.4.10 windows build fight (12:36:12) dazo: yeah ... (12:36:17) dazo ha scelto come argomento: https://community.openvpn.net/openvpn/wiki/Topics-2020-12-09 (12:42:28) cron2: internal chat? (12:42:39) dazo: trying (12:43:51) plaisthos: So I implemented AES-CCM :P (12:46:44) cron2: that sounds like a 2.6 update :-) (12:46:50) cron2: any news on dco? 2.5? (12:47:02) plaisthos: But on a more serious note, I am considerinng introducing XOR-ing our packet id with a shared secret (12:47:13) cron2: on the 2.4 front - I have tagged and pushed 2.4.10 this morning, and mattock is working on release building (12:47:48) plaisthos: so an observer doesn't know how many packets have already been sent by looking a single packet (12:48:23) plaisthos: and also avoids a purely theoretical precomputation attack ;) (12:49:31) dazo: cron2: nice! I'll kick off the Fedora/EPEL builds once the tarball + sigs are in place (12:49:51) plaisthos: I think I will look into the client with --bind bug next (12:50:34) dazo: what's that bug? (12:51:56) dazo: cron2: DCO ... I'm about to push out an updated openvpn3-linux client ... with TCP and IPv6 transport support implemented, just waiting for some regression testing to complete ... ordex might have more details on what else on his roadmap now :) (12:52:20) plaisthos: new client connection reuses old context on the server and since we don't run the new connect logic we don't generate a key since the ncp code assumes that key_id==0 is always a new session (12:52:32) dazo: ahh (12:52:53) mattock: damn (12:52:59) mattock: meeting slipped my mind completely (12:53:20) ordex: *boom* (12:53:27) mattock: anyhow, I will start the release machinery now, a surprise lunch interrupted that one (12:54:07) ordex: not a bad surprise (12:54:31) cron2: plaisthos: sounds good (12:55:11) plaisthos: For DCO and 2.5, the current ovpn-dco only works with p2p but the current p2p model is not easily extendable to p2mp (12:55:50) plaisthos: So ordex and I agree that we switch to a newer model in ovpn-dco that will also support p2mp beforr I continue with dco and 2.5 (12:56:02) ordex: things are undergoing big changes on the kernel side, to accommodate p2mp (12:56:07) ordex: yap (12:56:11) ordex: that's where I Am right now (12:56:20) ordex: (which also simplifies the code, in a sense) (12:56:29) cron2: good to know (12:56:46) cron2: plaisthos: have you shared your repo with bz? (12:56:53) cron2: (the RFC repo) (12:57:07) plaisthos: I sent an invite (12:58:29) plaisthos: https://bfy.tw/Psjf (12:58:30) vpnHelper: Title: LMGTFY (at bfy.tw) (12:58:33) plaisthos: https://bfy.tw/Psjf (12:58:35) plaisthos: https://bfy.tw/Psjf (12:58:37) plaisthos: https://bfy.tw/Psjf (12:59:06) plaisthos: argh (12:59:28) cron2: plaisthos: thanks. Haven't heard anything, just wanted to be sure its not stuck on our side (12:59:31) plaisthos: right mouse click windows terminal and nonsense in cliboard (12:59:43) ordex: :D (12:59:58) ordex: that was not nonsense (13:00:07) dazo: :D (13:04:00) dazo: so ... that's all for 2.5/2.6 updates? (13:04:05) cron2: a bit nonsense-ish it was :) (13:04:30) cron2: well, there is this openssl bug and "does it affect us, do we need a 2.5 (re-)release"? (13:05:12) dazo: ahh, right! (13:12:12) cron2: anyone? plaisthos? (13:15:01) dazo: https://www.openssl.org/news/vulnerabilities-1.1.1.html ... so the 1.1.1i release yesterday seems at first glance to be critical for us (13:15:01) vpnHelper: Title: /news/vulnerabilities-1.1.1.html (at www.openssl.org) (13:15:38) plaisthos: it is one of these. I not sure what exactly needs to be done to crash issues (13:15:59) becm [~b...@port-92-196-95-162.dynamic.as20676.net] è entrato nella stanza. (13:16:18) plaisthos: probably not an issue in most setups but I am not understanding the issue well enough to say "we don't that openssl version" (13:16:38) ordex: hm it seems the attacker also needs to control the CRL format (13:16:49) ordex: so for locally generated CRLs this is not a very big deal (13:16:55) ordex: IIUC (13:18:42) cron2: that was my assessment of the writeup - "if someone can put a messed-up CRL on your openvpn server and have openvpn read it, your old openssl might not be your biggest problem" (13:19:08) cron2: so - no 2.5.0 re-release? and 2.5.1 "in a few weeks"? (13:21:23) plaisthos: since CRLs are not really usable that well in openvpn (you need to fetch them) manually, we are not really affected by this bug (13:21:26) plaisthos: ;P (13:21:58) dazo: I would say we should probably kick off a 2.5.0 update for Windows with a new OpenSSL .... " Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack." ... since OpenVPN often uses client cert based auth, we cannot trust the clients. (13:21:58) dazo: There might be a possibility that clients may send a malicious cert which might be able to abuse this to gain access (13:22:04) mattock: I would say "2.5.1 in a few weeks" (13:22:12) mattock: if possible, at least (13:22:27) mattock: people will ask about this, so better have an explanation ready (13:23:31) dazo: Which is why I'm voting for a re-spin of 2.5.0 on Windows with the latest OpenSSL update ... "We're not 100% convinced OpenVPN is affected by this bug, but we don't want to take any risks" (13:24:30) dazo: I agree that most OpenVPN setups are most likely not affected, but the details and scope isn't that clear in the description (13:25:01) ordex: that sentence about the unrelated bug is quite cryptic (13:25:02) ordex: to me (13:27:20) dazo: yes, and that's what makes me concerned (13:29:45) ordex: by re-reading the upper part, I think this is simpl saying: openssl affected by this bug cannot really construct a working EDIPARTYNAME value, but if you try hard enough you can still do that and trigger the crash (13:29:47) dazo: I know the windows building can be a hassle and that it's easy for me to say "re-spin" not being involved in the build process ... but I don't want to compromise the security for an unclear issue. This was important enough for OpenSSL to do a pre-announcement without any details last week (13:30:00) ordex: but still under the assumption that you have provided both CRL *and* certificate to check (13:30:54) ordex: so if the CRL is not malformed, there is nothing to crash in any case (13:31:18) dazo: Unless the attacker manages to inject a malicious CRL (13:31:40) ordex: right (13:32:06) ordex: in the openvpn case, that means full access to the file system where the CRL is stored (13:32:32) dazo: Yeah, we don't do CRL downloads on-the-fly, so that's "good" (13:32:34) ordex: I can see that other apps may download the CRL from the web, so they don't know what they are using. but for openvpn I don't think that case exists (13:32:39) ordex: right (13:32:57) ordex: so imho this can wait for 2.5.1 (13:33:33) ordex: (and the problematic platform is OpenVPN ran as server on windows) (13:33:41) ordex: conclusion? :D (13:33:49) ordex: anybody in favour or re-doing 2.5.0 now? (13:34:21) mattock: not me, because I would take the hit :D (13:34:24) ordex: :D (13:34:26) cron2: I do not read this as critical, but I'm not the one having to do the work either (13:34:29) dazo: I'm still thinking "better safe than sorry" (13:34:35) mattock: installers are easier than full release, but still an effort (13:35:11) mattock: I could do 2.5.0 windows installer release later this week, if needed (13:35:13) ordex: can't people update openssl on their own ? (13:35:18) ordex: (on windows) (13:35:23) mattock: they could, yes (13:35:25) ordex: or will openvpn always use the bundled one? (13:35:36) dazo: mattock: I'm considering to request Andrew to release you from all your work except improving and fully automating Windows builds (13:35:47) mattock: I suppose you could put openssl you've obtained from openssl.org to openvpn directory (13:35:55) mattock: dazo: that request will fail miserably (13:36:00) mattock: that much I can tell :) (13:36:03) ordex: ah ok - not super easy though (13:36:09) ordex: anyway I have to run for lunch (13:36:27) ordex: I'd sitck to "not upgrade now", but I leave to you the final decision (13:36:30) dazo: mattock: I can be persistent in my requests if I want to :-P (13:36:32) ordex: *stick (13:36:46) mattock: dazo: you know how well cron2's IPv6 + community crusade has progressed, right? (13:36:48) mattock: :P (13:37:32) mattock: that said, it would be nice to get some help with automating openvpn 2.x releases and all that (13:37:43) cron2: dazo: can I use that for my ipv6 crusade? :-) (13:37:50) mattock: requesting that from andrew could be more beneficial than trying to detach me from ops work (13:38:36) mattock: there are simply too many junior guys in the ops team, so a large part of the harder stuff lands on my plate anyways (13:39:38) cron2: I need to leave now, sorry. I'll read the backlog, or bring up the other topics again later (13:39:39) dazo: cron2: Core team has geared up the IPv6 attention and making more noise as well ... so the attention is increasing steadily (13:39:46) cron2: \o/ (13:39:52) cron2: ok *wave* (13:39:59) mattock: ok, let's end this thing
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel